Loophole gives hackers access to DEC machines (English)
National licence
Marlene Brown.
In:
Computers and Security
;
7
, 2
;
221
;
1988
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:Loophole gives hackers access to DEC machines
-
Subtitle:Marlene Brown.
-
Published in:Computers and Security ; 7, 2 ; 221
-
Publisher:
-
Publication date:1988-01-01
-
Size:1 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents – Volume 7, Issue 2
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 114
-
From the editorDr. Highland, Harold Joseph et al. | 1988
- 115
-
Letters to the editor| 1988
- 117
-
Random bits & bytes| 1988
- 129
-
Discussing security with top managementDr. Bound, William A.J. et al. | 1988
- 131
-
Personnel: The other half of data securityZajac, Bernard P. Jr. et al. | 1988
- 132
-
Understanding the use of passwordsMenkus, Belden et al. | 1988
- 137
-
Pitfalls in measuring MIS performanceDr. Bologna, G.J. et al. | 1988
- 139
-
The application of epidemiology to computer virusesMurray, W.H. et al. | 1988
- 145
-
Anatomy of a virus attackDr. Highland, Harold Joseph et al. | 1988
- 151
-
Are we vulnerable to a virus attack? A report from SwedenDr. Fåk, Viiveke et al. | 1988
- 156,158
-
Virus defense alert| 1988
- 157
-
An overview of 18 virus protection productsDr. Highland, Harold Joseph et al. | 1988
- 157,161
-
How to combat a computer virusDr. Highland, Harold Joseph et al. | 1988
- 165
-
International board of referees| 1988
- 167
-
On the implications of computer viruses and methods of defenseCohen, Fred et al. | 1988
- 185
-
Organizational structuring of the computer security functionStraub, Detmar W. Jr. et al. | 1988
- 197
-
Make the tigers hunt for youProf. Dr. Herschberg, I.S. et al. | 1988
- 205
-
IFIP technical committee 11| 1988
- 207
-
World-wide reports on developments in computer security: Part II| 1988
- 210
-
What others are saying| 1988
- 213
-
Computer security shift is approved by Senate| 1988
- 213
-
Dickerson center of tug-of-war| 1988
- 213
-
Hold that Lawsuit| 1988
- 213
-
Legal protection for computer software| 1988
- 213
-
Microsoft, Borland Settle Dickerson Case| 1988
- 213
-
Aftershocks for Silicon Valley| 1988
- 214
-
Radio frequency interfaces—Myths, realities and a practical approach| 1988
- 214
-
Security in the VM environment| 1988
- 214
-
Remote identification and authentication of computer resource users| 1988
- 214
-
Security planning for EFT network systems| 1988
- 214
-
Shrink-wrap licensing| 1988
- 214
-
Hong Kong focus| 1988
- 215
-
Manage/38| 1988
- 215
-
Buyers turning toward software escrow plans| 1988
- 215
-
Computer viruses—A secret threat| 1988
- 215
-
Horatius| 1988
- 215
-
Insurance and computers: The technology gap| 1988
- 215
-
Computer user surveillance| 1988
- 216
-
Faulty tolerance adds security to critical on-line transactions| 1988
- 216
-
Senate approves funds for DEA tempest equipment| 1988
- 216
-
Data security provides the key to lock out intruders| 1988
- 216
-
Conference focuses on reduction of software risks| 1988
- 216
-
PC-mainframe ties hard to guard| 1988
- 216
-
How to secure a local area network| 1988
- 217
-
NSA, NBS coming together on computer security| 1988
- 217
-
New wave of LAN security products hailed by users| 1988
- 217
-
Crash course: Lessons in preventing computer downtime| 1988
- 217
-
Battling Mediocrity| 1988
- 217
-
Apollo skirts site license issue| 1988
- 217
-
Net failures growing concern in workplace| 1988
- 218
-
Uninterruptible power supplies| 1988
- 218
-
The structure of system/88, a fault-tolerant computer| 1988
- 218
-
MIS assumes a shirt-sleeves approach to protecting power| 1988
- 218
-
Most systems held fast while storm clouds grew on Wall St| 1988
- 218
-
Hardware, software security devices protect PCs and inside information| 1988
- 218
-
No easy way through data- security maze, consultants say| 1988
- 218
-
Is site licensing a dead issue?| 1988
- 219
-
A security checklist for upper management| 1988
- 219
-
Policies for secure personal data| 1988
- 219
-
Security considerations for minicomputer systems acquisitions| 1988
- 219
-
Guarding your data| 1988
- 219
-
Coalition to combat software piracy| 1988
- 219
-
Hardware protection of communications ports and lines| 1988
- 220
-
Fuss over bottom line could foil disaster recovery| 1988
- 220
-
NASD power dip could recur| 1988
- 220
-
To catch a thief: Lessons in systems security| 1988
- 220
-
Security systems: Getting management to shell out| 1988
- 220
-
Wanted: Full-time contingency planners| 1988
- 220
-
The corporate view| 1988
- 220
-
ANSI, Feds address DMBS security| 1988
- 221
-
Data encryption is key to safe file transmission| 1988
- 221
-
Evaluating signature verification systems is tricky| 1988
- 221
-
Loophole gives hackers access to DEC machines| 1988
- 221
-
Expert sees national security risks in BASIS net| 1988
- 221
-
NBS and NSA stand on different sides of security| 1988
- 224
-
Calendar| 1988